Authentication method of tag and backend database in radio-frequency identification (RFID) system based on bit strings
An authentication method and bit string technology, applied in the field of authentication of tags and back-end databases in bit string-based RFID systems, can solve problems such as leakage of confidential information
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] Such as Figure 4 Shown, the present invention comprises the following steps:
[0042] 1) The reader sends a random bit string R and query request Query to the tag.
[0043] 2) After receiving the request, the tag generates a random positive integer n 1 and n 2 , resulting in the first bit string PID 1L and the second bit string PID 2R , and calculate the temporary value SID of the tag security identifier temp for
[0044]
[0045] Then calculate the bit string R'=PID 1Ltemp ⊕PID 2Rtemp ⊕R, and send the result R’||n 1 ||n 2 to the reader.
[0046] Among them, ROL is a circular left shift, ROR is a circular right shift, Indicates that the label security identifier SID is cyclically shifted to the left (PID 1L ⊕PID 2R ⊕n 1 ⊕n 2 ) mod L bit, Indicates that the label security identifier SID is cyclically shifted to the right (PID 1L ⊕PID 2R ⊕n 1 ⊕n 2 )mod L bit, mod is the modulus operation; SID is the security identifier of the label, which is a ra...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


